110 research outputs found

    Removal and injection of keypoints for SIFT-based copy-move counter-forensics

    Get PDF
    Recent studies exposed the weaknesses of scale-invariant feature transform (SIFT)-based analysis by removing keypoints without significantly deteriorating the visual quality of the counterfeited image. As a consequence, an attacker can leverage on such weaknesses to impair or directly bypass with alarming efficacy some applications that rely on SIFT. In this paper, we further investigate this topic by addressing the dual problem of keypoint removal, i.e., the injection of fake SIFT keypoints in an image whose authentic keypoints have been previously deleted. Our interest stemmed from the consideration that an image with too few keypoints is per se a clue of counterfeit, which can be used by the forensic analyst to reveal the removal attack. Therefore, we analyse five injection tools reducing the perceptibility of keypoint removal and compare them experimentally. The results are encouraging and show that injection is feasible without causing a successive detection at SIFT matching level. To demonstrate the practical effectiveness of our procedure, we apply the best performing tool to create a forensically undetectable copy-move forgery, whereby traces of keypoint removal are hidden by means of keypoint injection

    Forgery detection from printed images: a tool in crime scene analysis

    Get PDF
    .The preliminary analysis of the genuineness of a photo is become, in the time, the first step of any forensic examination that involves images, in case there is not a certainty of its intrinsic authenticity. Digital cameras have largely replaced film based devices, till some years ago, in some areas (countries) just images made from film negatives where considered fully reliable in Court. There was a widespread prejudicial thought regarding a digital image which, according to some people, it cannot ever been considered a legal proof, since its “inconsistent digital nature”. Great efforts have been made by the forensic science community on this field and now, after all this year, different approaches have been unveiled to discover and declare possible malicious frauds, thus to establish whereas an image is authentic or not or, at least, to assess a certain degree of probability of its “pureness”. Nowadays it’s an easy practice to manipulate digital images by using powerful photo editing tools. In order to alter the original meaning of the image, copy-move forgery is the one of the most common ways of manipulating the contents. With this technique a portion of the image is copied and pasted once or more times elsewhere into the same image to hide something or change the real meaning of it. Whenever a digital image (or a printed image) will be presented as an evidence into a Court, it should be followed the criteria to analyze the document with a forensic approach to determine if it contains traces of manipulation. Image forensics literature offers several examples of detectors for such manipulation and, among them, the most recent and effective ones are those based on Zernike moments and those based on Scale Invariant Feature Transform (SIFT). In particular, the capability of SIFT to discover correspondences among similar visual contents allows the forensic analysis to detect even very accurate and realistic copy-move forgeries. In some situation, however, instead of a digital document only its analog version may be available. It is interesting to ask whether it is possible to identify tampering from a printed picture rather than its digital counterpart. Scanned documents or recaptured printed documents by a digital camera are widely used in a number of different scenarios, from medical imaging, law enforcement to banking and daily consumer use. So, in this paper, the problem of identifying copy-move forgery from a printed picture is investigated. The copy-move manipulation is detected by proving the presence of copy-move patches in the scanned image by using the tool, named CADET (Cloned Area DETector), based on our previous methodology which has been adapted in a version tailored for printed image case (e.g. choice of the minimum number of matched keypoints, size of the input image, etc.) In this paper a real case of murder is presented, where an image of a crime scene, submitted as a printed documentary evidence, had been modified by the defense advisors to reject the theory of accusation given by the Prosecutor. The goal of this paper is to experimentally investigate the requirement set under which reliable copy-move forgery detection is possible on printed images, in that way the forgery test is the very first step of an appropriate operational check list manual

    Documenti e Studi sulla Tradizione Filosofica Medievale

    Get PDF

    Hygiene inspections on passenger ships in Europe - an overview

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Hygiene inspections on passenger ships are important for the prevention of communicable diseases. The European Union (EU) countries conduct hygiene inspections on passenger ships in order to ensure that appropriate measures have been taken to eliminate potential sources of contamination which could lead to the spread of communicable diseases. This study was implemented within the framework of the EU SHIPSAN project and it investigates the legislation applied and practices of hygiene inspections of passenger ships in the EU Member States (MS) and European Free Trade Association countries.</p> <p>Methods</p> <p>Two questionnaires were composed and disseminated to 28 countries. A total of 92 questionnaires were completed by competent authorities responsible for hygiene inspections (n = 48) and the creation of legislation (n = 44); response rates were 96%, and 75.9%, respectively.</p> <p>Results</p> <p>Out of the 48 responding authorities responsible for hygiene inspections, a routine programme was used by 19 (39.6%) of these to conduct inspections of ships on national voyages and by 26 (54.2%) for ships on international voyages. Standardised inspection forms are used by 59.1% of the authorities. A scoring inspection system is applied by five (11.6%) of the 43 responding authorities. Environmental sampling is conducted by 84.1% of the authorities (37 out of 44). The inspection results are collected and analysed by 54.5% (24 out of 44) of the authorities, while 9 authorities (20.5%) declared that they publish the results. Inspections are conducted during outbreak investigations by 75% and 70.8% of the authorities, on ships on national and international voyages, respectively. A total of 31 (64.6%) and 39 (81.3%) authorities conducted inspections during complaint investigations on ships on international and on national voyages, respectively. Port-to-port communication between the national port authorities was reported by 35.4% (17 out of 48) of the responding authorities and 20.8% (10 out of 48) of the port authorities of other countries.</p> <p>Conclusion</p> <p>This study revealed a diversity of approaches and practices in the conduct of inspections, differences in the qualifications/knowledge/experience of inspectors, the legislation applied during inspections, and the lack of communication and training among many EU countries. An integrated European inspection programme involving competent expert inspectors in each EU Member States and special training for ship hygiene delivered to crew members and inspectors would help to minimize the risk of communicable diseases. Common inspection tools at a European level for hygiene inspection practices and port-to-port communication are needed.</p

    SIFT match removal and keypoint preservation through dominant orientation shift

    No full text
    In Image Forensics, very often, copy-move attack is countered by resorting at instruments based on matching local features descriptors, usually SIFT. On the other side, to overcome such techniques, smart hackers can try firstly to remove keypoints before performing image patch cloning in order to inhibit the successive matching operation. However, keypoint removal determines per se some suspicious empty areas that could indicate that a manipulation has occurred. In this paper, the goal to nullify SIFT matches while preserving keypoints is pursued. The basic idea is to succeed in altering the features descriptor by means of shifting the dominant orientation associated to a specific keypoint. In fact, to provide rotation invariance, all the values of the descriptor are computed according to such orientation. So doing, it should impair the whole matching phase. © 2015 EURASIP
    corecore